First page Back Continue Last page Summary Graphics

Perimeter Defenses

  • Perimeter Defenses include firewalls and screening routers, as well as access control mechanisms, such as Secure Shell (ssh), Kerberos and S/Key one-time pad authentication schemes. The goal of perimeter defenses is to keep the bad guys out. It is also about guarding the border of your systems and network. This includes disabling or limiting unneeded or dangerous services (NFS, NETBIOS, RPC, etc)
  • For network security, this would also include inter-host communications, and trust models.

    Notes: